sprout-uci / vrasedLinks
☆21Updated 3 years ago
Alternatives and similar repositories for vrased
Users that are interested in vrased are comparing it to the libraries listed below
Sorting:
- On the TOCTOU Problem in Remote Attestation☆15Updated last year
- TPM attestation client and server for TPM 20. and TPM 1.2, including enrollment, attestation, and a web UI.☆16Updated 10 months ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆15Updated 3 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆31Updated last year
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆25Updated last year
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆48Updated this week
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated last month
- An on-device confidential computing platform☆132Updated last week
- ☆25Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 9 months ago
- Crypto library☆66Updated last week
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆60Updated last month
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆34Updated last year
- Minimal RISC Extensions for Isolated Execution☆54Updated 6 years ago
- ☆42Updated 3 months ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆63Updated last year
- Meeting materials☆16Updated 3 weeks ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆71Updated 2 months ago
- A framework for formally verifying hardware security modules to be free of hardware, software, and timing side-channel vulnerabilities 🔏☆40Updated 3 weeks ago
- ☆43Updated 2 months ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Updated 4 years ago
- ☆61Updated 3 months ago
- COCONUT-SVSM☆188Updated this week
- ☆27Updated 9 months ago
- ☆21Updated last year
- Reference implementation of Arm-CCA RMM specification☆66Updated this week
- Linux Security Hardening for Confidential Compute☆69Updated last year
- Verifying OpenTitan☆27Updated 2 years ago